Our fourth conference focused on military and paramilitary activities in cyberspace. The topic was explored from strategic, conceptual, political, legal and technical perspectives within two parallel tracks, the Law & Policy Track and the Technical Track. Strategy Breakout Session and multiple pre-conference workshops completed the comprehensive programme offered. CyCon 2012 was supported by IEEE, Cisco, Gamma International and Microsoft. Videos of most of the presentations along with the presentation slides and published articles are available from here, proceedings are available for download here.
More than 380 experts gathered in Tallinn, Estonia, to participate in the annual International Conference on Cyber Conflict. Presentations treated the legal aspects of cyber conflict as well as the technical ones, including recent issues such as Stuxnet and iBots. The conference concluded with a presentation of the NATO cyber defence policy that was endorsed by the NATO defence ministers on Wednesday. The conference was supported by IEEE, European Union Regional Development Fund and Netwitness. Videos and slides of the talks are available from here, proceedings are available for download here.
The conference brought together more than 300 computer security specialists from 39 countries. During the event, experts from government, private sector and the academia discussed cyber security in three parallel conference tracks: strategy, law and technical. Keynote speakers included renowned cryptographer Bruce Schneier and former cyber security adviser to the US president, Melissa Hathaway. The conference was supported by European Union Regional Development Fund, Breaking Point, Microsoft, Netwitness and Skype. Videos and slides of the talks are available from here, proceedings are available for download here.
This expert-level conference focused on the legal and policy aspects of cyber conflict and was aimed at promoting closer collaboration among the international community of leaders and experts in government, private sector, and academia; sharing current initiatives and best practices of cyber conflict management; developing a common understanding of the multidisciplinary and layered approach to cyber conflict management and initiating an international dialogue that facilitates creation of the ideal curriculum for cyber conflict education and training programs. You can download the conference proceedings here.
The Call for Papers for the Conference on Cyber Warfare yielded an impressive agenda: 29 presentations from 13 countries, written by some of the best and brightest minds in academia, government, business, and the military. They covered the emerging field of cyber warfare in theory and in practice, from both strategic and tactical perspectives. Luminaries such as Mikko Hypponen, James Lewis, Jose Nazario, Felix Leder, Tillmann Werner, Roel of Temmingh, Amit Yoran, and Billy Rios highlighted a program that began with a presentation by The Information Warfare Monitor of the biggest network security story of 2009, Tracking Ghost Net: Investigating a Cyber Espionage Network. You can download the conference proceedings here.